An Intelligent Honeypot for Heterogeneous IoT Devices using Reinforcement Learning
☆27May 10, 2019Updated 6 years ago
Alternatives and similar repositories for Intelligent-IoT-Honeypot
Users that are interested in Intelligent-IoT-Honeypot are comparing it to the libraries listed below
Sorting:
- RASSH – Reinforced Adaptive SSH Honeypot This is a project developed for my Phd Thesis and the target is to create an Adaptive Honeypot…☆12Jul 29, 2019Updated 6 years ago
- An adaptive honeypot using a reinforcement learning implementation, to learn from interactions from automated malware attacks☆24Apr 9, 2019Updated 6 years ago
- A framework for the automatic generation of Intelligent-Interaction honeypots using OpenWrt-based firmware.☆11Jun 11, 2022Updated 3 years ago
- We implement IoTPOT, a novel honeypot to emulate Telnet services of various IoT devices to analyze ongoing attacks in depth. IoTPOT consi…☆26Sep 4, 2015Updated 10 years ago
- ☆14Oct 13, 2021Updated 4 years ago
- WhiteRabbitTracker: Analyzing malware evasions with information flow tracking☆18Jul 25, 2021Updated 4 years ago
- ☆42Oct 31, 2019Updated 6 years ago
- This tool to simulate http server attacks in Python which logs HackerIP and all the tracing he does into a Logfile then a database.☆73May 9, 2019Updated 6 years ago
- Python telnet honeypot for catching botnet binaries☆313Feb 2, 2024Updated 2 years ago
- SBOM-TOOL is a ctl tool that generates software bill of materials (SBOM) for software projects through source code warehouse, code finger…☆13Oct 11, 2025Updated 4 months ago
- Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).☆35Oct 23, 2017Updated 8 years ago
- Implementation of the paper "Opcodes as predictor for malware " by Daniel Bilar☆11Oct 17, 2020Updated 5 years ago
- PEVuln: A Benchmark Dataset for Using Machine Learning to Detect Vulnerabilities in PE Malware☆14Nov 26, 2025Updated 3 months ago
- ☆11Jun 20, 2023Updated 2 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Provides a Learning Tools Interoperability (LTI) integration for creating WordPress blogs with appropriate user roles based on roles set …☆12Mar 17, 2025Updated 11 months ago
- ☆16Oct 26, 2024Updated last year
- 哔哩哔哩(https://www.bilibili.com )读取楼层,发送评论,抢楼,抢沙发☆11Apr 16, 2018Updated 7 years ago
- IoT and Operational Technology Honeypot☆105Oct 7, 2023Updated 2 years ago
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- Browser-based packet viewer powered by Wireshark☆20Jul 28, 2025Updated 7 months ago
- medium interaction postgresql honeypot☆12Aug 6, 2024Updated last year
- This document introduces how to implement a secure boot chain in UEFI using the TianoCore EDK II project☆12Apr 30, 2025Updated 10 months ago
- Repository resource threat intelligence for SOC☆10Sep 14, 2018Updated 7 years ago
- Monocerus emulator framework☆11Mar 28, 2019Updated 6 years ago
- ☆12Jun 8, 2021Updated 4 years ago
- Converts a PCAP file to a PANDAS or SFRAME data frame☆14Apr 19, 2019Updated 6 years ago
- Corresponding code to "Improving Robustness of ML Classifiers against Realizable Evasion Attacks Using Conserved Features" @ USENIX Secur…☆11Aug 5, 2019Updated 6 years ago
- ☆11Jan 23, 2020Updated 6 years ago
- The PT tracing portion of Barnum.☆11Feb 8, 2019Updated 7 years ago
- afl-pytmin is a wrapper of afl-tmin, test case minimizer for American Fuzzy Lop (afl).☆13Apr 14, 2017Updated 8 years ago
- ☆12Jun 20, 2022Updated 3 years ago
- ☆45Apr 8, 2020Updated 5 years ago
- Exploits for various CVEs☆11Mar 19, 2022Updated 3 years ago
- Classifying malware families by converting their binaries to images and then applying Convolutional Neural Network solutions.☆13Nov 11, 2021Updated 4 years ago
- A tool for automated MITM attacks on SSL connections.☆22May 18, 2012Updated 13 years ago
- A graph-based deep learning tool that can recognizes the kernel objects from raw memory dumps.☆14Jul 6, 2019Updated 6 years ago
- A SSH honeypot written in Go☆13Dec 12, 2013Updated 12 years ago